A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
References
Link | Resource |
---|---|
https://wpdiscuz.com/community/news/security-vulnerability-issue-in-5-3-5-please-udate/ | Patch Vendor Advisory |
https://wordpress.org/plugins/wpdiscuz/#developers | Release Notes Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2323200 | Third Party Advisory |
https://plugins.trac.wordpress.org/browser/wpdiscuz/tags/5.3.6 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/07/06/1 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-06-18 08:15
Updated : 2023-01-27 16:56
NVD link : CVE-2020-13640
Mitre link : CVE-2020-13640
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
gvectors
- wpdiscuz